Networking
1. Basics

Remember we added 3 more on the basic Network
  • Personal Area Network - PAN
  • Local Area Network - LAN
  • Campus Area Network - CAN
  • Metropolitan Area Network - MAN
  • Wide Area Network - WAN known also as the Internet.
This list is also arranged from smallest to biggest.

2. Basic Hardware connections


3. Network Topology

We added Hybrid - a combination of 2 or more topologies.

4.Binary

You can have up to 255 if you assign all ones on your 8-bit system
128 64 32 16 8 4 2 1
1 1 1 1 1 1 1 1

5.The 7 Layers of OSI (Open System Interconnection)- Physical Layer


Data Link Layer



Network and Transport Layer



Part of the OSI MODEL



  • Bottom Layers (1 -2 ) - Transmit Data Packets
  • Middle Layers (3-5) - Communication Layers
  • Top Layers (6-7) - Presents Data to Users



Note the difference between Analogue, Digital and Fiber Optic Signals.

Basic Network Anatomy:
1. Network Hardware -router, switches, hubs, gateways, access points, network interface cards, cables, bridges, modem, Integrated Services Digital Network (ISDN) and firewalls
  • Enables the users to share computer hardware resources, reducing cost and making it possible for more people to take better advantage of powerful computer equipment.
2. Network Software
  • Enable users to share data and software programs, increasing efficiency and productivity.
3. People
  • Network enable people to work, play, communicate in ways that otherwise difficult or impossible.

We will be discussing the IT CONCEPTS OF NETWORKING. Some topics were assigned; you will see the names right beside the topics.

1.Client, host, server (See Basic P2P)
  • Computer systems which are used as central location of data and programs. Commonly shared by different users in a network environment.

2. Mainframe, supercomputers



3. Grid Computing and Distributed processing [SANG]
  • Video will be uploaded soon.
4. Ethernet, peer to peer
Ethernet.gif
  • Ethernet - uses a communication concept called datagrams to transfer messages across the network. Datagrams take the form of self-contained packets of information comprising fields that contain information about their data, origin, destination and type. The data field in each packet can contain up to 1500 bytes. Take mailing as a . An Ethernet packet is not just a letter. It also contains the sender address, receiver address and the stamp indicating the exact contents of that packet.("DeviceNet vs Ethernet." Machinery Automation & Robotics - Specialists in Industrial Machinery Service. Web. 11 Dec. 2011. <http://www.machineryautomation.com.au>)

Things you must know about Ethernet

  • Peer to peer - is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called peers. The process works like this:

    • You run peer-to-peer file-sharing software (for example, a Gnutella program) on your computer and send out a request for the file you want to download.
    • To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.
    • When the software finds a computer that has the file you want on its hard drive, the download begins.
    • Others using the file-sharing software can obtain files they want from your computer's hard drive.

    The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called leeching. This limits the number of computers the software can search for the requested file. (Content lifted from"HowStuffWorks "Peer-to-peer File Sharing"" HowStuffWorks "Computer" Web. 11 Dec. 2011. <http://computer.howstuffworks.com/bittorrent1.htm>.)

Basic P2P



How to do do a peer to peer network with your UTP Cable.



The danger of Peer to Peer file sharing



Cloud computing

5. Local Area Network (LAN), Wide Area Network (WAN), Virtual LAN, wireless LAN, Home Network



6. Internet, intranet, extranet and virtual private network (VPN)

Different VPN


7. Routers, switches, hubs
The difference

8. Connection types: Optical fibers, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), microwave


9. Network operating system and utility software

10. Cloud computing [TORD]
Video will be uploaded soon.

11. Storage technologies: for example Storage area Network (SAN), Redundant array of inexpensive disk(RAID) [IRENE]

12. Network functionality
- Protocol
- Synchronous, asynchronous
- Remote access [JENNY]
video wil be uploaded soon

- Bandwidth and broadband [MITCHELL]

14. Network Administration
-Electronic security:
~Authorize access, Level of access, biomentrics, login, password, firewalls, proxy server, encryption, secure socket layer (SSL) audit trails. [GELSON]



  • License: Single users, Multi-user, Concurrent, network site
  • Physical Security: Lock or secured rooms
  • Monitoring: keystroke Monitoring, system performance, surveillance
  • Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
  • Codes of ethics and professional conduct: Association of Computing Machinery (ACM)
  • Data centers
  • Energy usage, uninterrupted power supply (UPS)


Videos That you need to see: TAKE DOWN NOTES to help you with the parts that you need to finish.

1.Network Communication Protocol for Networks and Internets
PART 1

PART 2


2. The Internet


3. The Network Society


Cloud Computing